Part 0: Overview and vocabulary

Similar documents
ITIL from brain dump_formatted

EXIN ITIL. Exam Name: Exin ITIL Foundation

ITIL V3 Foundation (Classified Questions) Page 1 of Which of the following questions does Service Strategy help answer with its guidance?

ITIL Foundation Instructor-led Live Online Training Program

EX0-117 Exin ITIL Certification Exam

EXIN ITIL Exam Questions & Answers

Implementing ITIL Best Practices

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITIL Foundation v.3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0.

ITIL Foundations. Introduction. May 14, 2007

HP Service Manager. Software Version: 9.40 For the supported Windows and Unix operating systems. Processes and Best Practices Guide (Classic Mode)

Release & Deployment Management PinkVERIFY

Problem Management ITIL v3 Problem Management Process

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

TECHNOLOGY brief: Event Management. Event Management. Nancy Hinich-Gualda

Contents An Introductory Overview of ITIL Service Lifecycle: concept and overview...3 I. Service strategy...6 The 4 P's of ITIL Service

ISMS AUDIT CHECKLIST

Session 205: ITSM Deep Dive: Classification, Prioritization, Escalation & Alerting

ITIL Foundation v V1. Module 4: Service Transition. Reader s Note QAI India Ltd. I

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER. Identifying & Implementing Quick Wins

The Basics of ITIL Help Desk for SMB s

Incident Management. Process and Procedures Guide

ITIL Asset and Configuration Management in the Cloud. January 2017

General Platform Criterion Assessment Question. SLM-11-G-001 Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 N/A

iso20000templates.com

1010 La Trobe Street Docklands Victoria

Micro Focus Service Desk 7.4 System Planning, Deployment, and Best Practices Guide. November 2016

ITSM Process/Change Management

Exin Exam EX0-117 ITIL Foundation (syllabus 2011) Version: 16.0 [ Total Questions: 238 ]

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study

AGILE ITIL SOFTWARE. Data Sheet AGILE ITIL SERVICE DESK AND ITSM JUMP START YOUR SERVICE DESK ITIL CERTIFIED PROCESSES WHOSE ITIL?

EXIN,Inc. Exam Questions ITILFND. ITIL Foundation (syllabus 2011) Version:Demo. ITILFND Exam Questions Demo

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes

An Overview of the AWS Cloud Adoption Framework

Expert Reference Series of White Papers. Microsoft Service Manager Simplified

ITIL Intermediate Lifecycle Stream:

ITIL Sample Papers. The Official ITIL Accreditor Sample Examination Papers. Terms of use

ITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization

BMC - Business Service Management Platform

ITILSC-SOA ITILSC-SOA ITIL Service Capability Service Offerings and Agreements Exam

The following form is available in the service management application for the Availability Management process:

CMMI-SVC V1.3 CMMI for Services Version 1.3 Quick Reference Guide

Governance in a Multi-Supplier Environment

Y AR ISSUE COMPLIMENT

Service Desk Certification YOUR ESSENTIAL HANDBOOK

IT Service Management

ITIL CSI Intermediate. How to pass the exam

D6.2: Service management tools implementation and maturity baseline

Level 5 NVQ Diploma in Management and Leadership Complete

Understanding the relationship between Asset Management and the CMDB

Information technology Security techniques Information security management systems Overview and vocabulary

Level 3 Diploma in Management. Qualification Specification

Enhancement of etom Assurance Domain by Integration with COBIT5 Framework

ITIL Intermediate Lifecycle Stream:

UCISA ITIL Case Study on the University of Huddersfield

BPO Service Level Agreement

REPORT 2014/115 INTERNAL AUDIT DIVISION. Audit of information and communications technology management at the United Nations Office at Geneva

SERVICE OPERATION. ITIL - Part 2

Change Management Process

INFORMATION TECHNOLOGY (IT) CHANGE MANAGEMENT

Why bother with a Service Catalogue?

Internal Audit Report. IT Change Management Review March 2016

DRAFT ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance

Leveraging Your Service Quality Using ITIL V3, ISO and CMMI-SVC. Monday Half-Day Tutorial

Demand Management User Guide. Release

R ESOURCE C ENTRE O PERATIONAL L EVEL A GREEMENT

Asset management Overview, principles and terminology

Incident Management. What is it? Why use it? Who wants it? Cheryl Nickel ITSM Process Specialist MTS Allstream September 22, 2011

Health and Safety Management Standards

Module 2 Study Guide. ITIL Managing Across the Lifecycle

ISO 14001: 2015 Environmental Gap Analysis

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide

Moving on in Service Management - Real ITSM Brian Scott & Chris Finden-Browne March-26

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Guidelines for information security management systems auditing

INTERNATIONAL STANDARD

Qualification Specification 601/3688/1 icq Level 3 Diploma in Management (RQF)

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Qualification Specification 601/3690/X icq Level 4 NVQ Diploma in Management (RQF)

ISO/IEC 27001:2005 BASED INFORMATION SECURITY MANAGEMENT SYSTEM INFORMATION SECURITY MANAGEMENT SYSTEM MANUAL

ISO 28002: RESILIENCE IN THE SUPPLY CHAIN: REQUIREMENTS WITH GUIDANCE FOR USE

ServiceNow Order Form Product and Use Definitions

EVM-11-G-001 Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 N/A. Edition workflows and process integrations?

Bryce Dunn Senior Product Manager Vantage. SLM/BSM & IT Business Alignment March 6, 2008

Building up an IT Service Management System through the ISO Certification

Building a Foundation for Effective Service Delivery and Process Automation

E-vote SSA-V Appendix 2 Contractor Solution Specification Project: E-vote 2011

Practical Stories of ITIL Quick Wins

Security Monitoring Service Description

How to achieve ISO/IEC The key successful factors

Summary of TL 9000 R4.0 Requirements Beyond ISO 9001:2000

INTERNATIONAL STANDARD

IT Services Management Service Brief

Federal Financial Supervisory Authority (BaFin)

Guidelines for Information Asset Management: Roles and Responsibilities

PRINCESS NOURA UNIVESRSITY. Project Management BUS 302. Reem Al-Qahtani

Selecting the Best. How to Realize the Goals of Contemporary IT Service Management Frameworks. IT Services Management Framework BEST PRACTICES

Management System Manual International Compliance Group

Information Technology Services Project Management Office Operations Guide

Session 308 Monday, October 21, 3:00 PM - 4:00 PM Track: Industry Insights

An IT Service Reporting Framework for Effective Implementation of ITIL Continual Service Improvement Process Conforming to ISO/EC 20000

Transcription:

Edition 2016 Version 2.4 This work is licensed under a Creative Commons Attribution 4.0 International License. www.fitsm.eu

Document control Document Title Part 0: Overview and vocabulary Document version 2.4 Release date 2016-08-24 Table of Contents 1. Foreword... 1 2. Introduction... 1 3. Scope and applicability... 2 4. Overview of the FitSM family of standards... 2 5. Terms and definitions... 2 5.1 Accessibility of information... 2 5.2 Activity... 2 5.3 Assessment... 2 5.4 Audit... 3 5.5 Availability... 3 5.6 Capability level... 3 5.7 Capacity... 3 5.8 Change... 3 5.9 Classification... 3 5.10 Closure... 4 5.11 Competence... 4 5.12 Confidentiality of information... 4 5.13 Conformity... 4 5.14 Configuration... 4 5.15 Configuration item (CI)... 4 5.16 Configuration management database (CMDB)... 4 5.17 Continuity... 5 5.18 Customer... 5 5.19 Document... 5 5.20 Effectiveness... 5 5.21 Efficiency... 5 5.22 Escalation... 5 5.23 Federation... 5 5.24 Federation member... 6 5.25 Federator... 6 FitSM was co-funded by the European Commission under contract number 312851.

5.26 Improvement... 6 5.27 Incident... 6 5.28 Information security... 6 5.29 Information security control... 6 5.30 Information security event... 6 5.31 Information security incident... 6 5.32 Integrity of information... 6 5.33 IT service... 6 5.34 IT service management (ITSM)... 7 5.35 Key performance indicator (KPI)... 7 5.36 Known error... 7 5.37 Management review... 7 5.38 Management system... 7 5.39 Maturity level... 7 5.40 Nonconformity... 8 5.41 Operational level agreement (OLA)... 8 5.42 Operational target... 8 5.43 Policy... 8 5.44 Post implementation review (PIR)... 8 5.45 Priority... 8 5.46 Problem... 8 5.47 Procedure... 8 5.48 Process... 8 5.49 Record... 9 5.50 Release... 9 5.51 Request for change (RFC)... 9 5.52 Risk... 9 5.53 Role... 9 5.54 Service... 9 5.55 Service acceptance criteria (SAC)... 9 5.56 Service catalogue... 9 5.57 Service component... 10 5.58 Service design and transition package (SDTP)... 10 5.59 Service level agreement (SLA)... 10 5.60 Service management... 10 5.61 Service management plan... 10 FitSM was co-funded by the European Commission under contract number 312851.

5.62 Service management system (SMS)... 10 5.63 Service portfolio... 10 5.64 Service provider... 11 5.65 Service report... 11 5.66 Service request... 11 5.67 Service review... 11 5.68 Service target... 11 5.69 Supplier... 11 5.70 Top management... 11 5.71 Underpinning agreement (UA)... 11 5.72 Underpinning contract (UC)... 12 5.73 User... 12 5.74 Value... 12 5.75 Workaround... 12 6. Overview of the FitSM process model... 13 FitSM was co-funded by the European Commission under contract number 312851.

1. Foreword FitSM is a lightweight standards family aimed at facilitating service management in IT service provision, including federated scenarios. The main goal of the FitSM family is to maintain a clear, pragmatic, lightweight and achievable standard that allows for effective IT service management (ITSM). FitSM is and will remain free for everybody. This covers all parts of the standard, including the core parts and implementation aids. All parts of the FitSM standard and related material published by the FitSM working group are licensed under a Creative Commons International License. The development of FitSM was supported by the European Commission as part of the Seventh Framework Programme. FitSM is owned and maintained by ITEMO e.v., a non-profit partnership of specialists in the field of IT management, including experts from industry and science. FitSM is designed to be compatible with the International Standard ISO/IEC 20000-1 (requirements for a service management system) and the IT Infrastructure Library (ITIL). Although the FitSM process model, requirements, recommended activities and role model target a lightweight implementation, it can act as a first step to introducing full ITSM, i.e. applying ITIL good practices and / or achieving compliance against ISO/IEC 20000-1. The FitSM family is made up of several documents, providing guidance and input on different aspects of ITSM in federated ICT infrastructures: FitSM-0: Overview and vocabulary (this document) FitSM-1: Requirements FitSM-2: Objectives and activities FitSM-3: Role model FitSM-4: Selected templates and samples (set of documents under continual development) FitSM-5: Selected implementation guides (set of documents under continual development) FitSM-6: Maturity and capability assessment scheme All documents are available and published in their most recent version through the website www.fitsm.eu. Enquiries about the standard and its applicability should be directed by e-mail to info@fitsm.eu. 2. Introduction This part of FitSM provides an overview of the FitSM family and a common vocabulary used by the other parts of the standard (in particular by FitSM-1). It helps to harmonise and facilitate discussion by those trying to implement IT Service Management using FitSM or any other compatible ITSM approach. Page 1 Version 2.4

3. Scope and applicability This part of the standard provides: a general overview of the FitSM family of standards; terms and definitions for use in the FitSM family of standards; an overview of the FitSM process model. This standard is applicable to all types of organisation (e.g. commercial enterprises, government agencies, non-profit organizations) from which IT services are provided, regardless of type, size and the nature of the services delivered. It is especially suitable for groups new to service management, or for federated scenarios. 4. Overview of the FitSM family of standards The FitSM family is made up of several documents, providing guidance and input on different aspects of ITSM. The following figure shows their relationships. 5. Terms and definitions For the purpose of the FitSM family of standards, the following terms and definitions apply. 5.1 Accessibility of information Property of information being accessible and usable by an authorized party 5.2 Activity Set of actions carried out within a process 5.3 Assessment Set of actions to evaluate the capability level of a process or the overall maturity level of a management system Page 2 Version 2.4

5.4 Audit Systematic, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled Note 1: Audit evidence is typically based on documented information, information provided during an audit interview, and information gathered through observation. Note 2: Audit criteria may be based on requirements from a management system (including policies, processes and procedures), agreements (including service level agreements and underpinning agreements), contracts, standards or legislation. Note 3: An audit may be an internal audit, if it is conducted under the direct responsibility of the organisation or federation that is subject to the audit, or an external audit, if it is conducted by an external party. Note 4: Both internal and external audits should be conducted by skilled and experienced auditors, and auditors should not audit their own work or areas of responsibilities to ensure the impartiality of the results. 5.5 Availability Ability of a service or service component to fulfil its intended function at a specific time or over a specific period of time 5.6 Capability level Achieved level of effectiveness of an individual process or general aspect of management 5.7 Capacity Maximum extent to which a certain element of the infrastructure (such as a configuration item) can be used Note: This might mean the total disk capacity or network bandwidth. It could also be the maximum transaction throughput of a system. 5.8 Change Alteration (such as addition, removal, modification, replacement) of a configuration item (CI) 5.9 Classification Assignment of items to defined groups based on common attributes, relations or other criteria Note 1: Items that are subject to classification may include documents, records (such as incident records or change records), services, configuration items (CIs), etc. Defined groups may include categories (such as incident categories or change categories) or priority levels. Note 2: The act of classification often comprises the application of more than one classification scheme. For instance, an incident record might be assigned to a technical incident category such as software related, network related, etc., and also to a priority level like low priority, medium priority, etc. The assignment of various incidents, service requests, changes and problems to an affected CI is also a classification. Page 3 Version 2.4

Note 3: Besides the presentation and analysis of relationships, classification is often used as input for controlling the workflow of a process, e.g. by assigning a priority level to an incident. 5.10 Closure Final activity in a workflow of a process to indicate no further action is required for a specific case Note: Cases that are subject to closure may include incidents, problems, service requests or changes. The activity of closure puts the connected record (such as the incident record, problem record, service request record or change record) in its final status, usually called closed. 5.11 Competence Sum of knowledge, skills and experience that an individual or group needs to effectively take on a specific role 5.12 Confidentiality of information Property of information not being accessible to unauthorized parties 5.13 Conformity Extent to which requirements are met in some context Note: In the context of FitSM, the term compliance is generally used as a synonym for conformity. However, sometimes conformity is used in the context of adherence to internal regulations and requirements as defined by policies, processes and procedures, while compliance is used in the context of adherence to external requirements, such as laws, standards and contracts. 5.14 Configuration State of a specified set of attributes, relationships and other relevant properties of one or more configuration items (CIs) Note: The documented configuration of a number of CIs at a given point in time is called a configuration baseline, which is usually taken prior to the deployment of one or more changes to these CIs in the live environment. 5.15 Configuration item (CI) Element that contributes to the delivery of one or more services or service components, therefore requiring control of its configuration Note 1: CIs can vary widely, from technical components (e.g. computer hardware, network components, software) to non-technical items such as documents (e.g. service level agreements, manuals, license documentation). Note 2: The data necessary for effective control of a CI is stored in a CI record. In addition to attributes of the CI, the CI record likely includes information on relationships it has with other CIs, service components and services. CI records are stored in a configuration management database (CMDB). 5.16 Configuration management database (CMDB) Store for data about configuration items (CIs) Page 4 Version 2.4

Note: A CMDB is not necessarily a single database covering all configuration items (CIs). It may rather be composed of multiple physical data stores. 5.17 Continuity Property of a service to maintain all or parts of its functionality, even in exceptional circumstances Note: Exceptional circumstances include emergencies, crises or disasters which affect the ability to provide services over extended periods of time. 5.18 Customer Organisation or part of an organisation that commissions a service provider in order to receive one or more services Note: A customer usually represents a number of users. 5.19 Document Information and its supporting medium Note: Examples of documents include policies, plans, process descriptions, procedures, service level agreements, contracts or records of activities performed. 5.20 Effectiveness Extent to which goals and expectations are met Note: In a management system, effectiveness is mostly measured against the defined goals of the processes that are subject to this system. 5.21 Efficiency Degree of ability to meet goals and expectations with minimum consumption of resources Note 1: In a management system, efficiency is mostly considered in the context of the processes that are subject to this system. Note 2: Resources may be human, technical, informational or financial. 5.22 Escalation Change of responsibility for a case (such as an incident, service request, problem or change) or activity to another individual or group Note: There are two basic types of escalation: Hierarchical escalation transfers responsibility (temporarily) to someone with a higher level of authority. Functional escalation transfers responsibility to someone with a different set of competencies or privileges required to handle the case or activity. 5.23 Federation Situation in which multiple parties, the federation members, jointly contribute to the delivery of services to customers without being organised in a strict hierarchical setup or supply chain. Page 5 Version 2.4

5.24 Federation member Individual, organisation or body that works together with other federation members in a federation to provide one or more services Note: Often, federation members will not be bound together by strict contractual agreements. 5.25 Federator Body that acts to coordinate a set of federation members 5.26 Improvement Action or set of actions carried out to increase the level of conformity, effectiveness or efficiency of a management system, process or activity, or to increase the quality or performance of a service or service component Note: An improvement is usually implemented after an opportunity for improvement has been identified, for instance during a service review, audit or management review. 5.27 Incident Unplanned disruption of operation in a service or service component, or degradation of service quality versus the expected or agreed service level or operational level according to service level agreements (SLAs), operational level agreements (OLAs) and underpinning agreements (UAs). 5.28 Information security Preservation of confidentiality, integrity and accessibility of information 5.29 Information security control Means of controlling or treating one or more risks to information security 5.30 Information security event Occurrence or previously unknown situation indicating a possible breach of information security Note: An occurrence or situation is considered a potential breach of information security if it may lead to a negative impact on the confidentiality, integrity and / or accessibility of one or more information assets. 5.31 Information security incident Single information security event or a series of information security events with a significant probability of having a negative impact on the delivery of services to customers, and therefore on the customers business operations 5.32 Integrity of information Property of information not being subject to unauthorized modification, duplication or deletion 5.33 IT service Service that is enabled by the use of information technology (IT) Page 6 Version 2.4

5.34 IT service management (ITSM) Entirety of activities performed by an IT service provider to plan, deliver, operate and control IT services offered to customers Note: The activities carried out in the ITSM context should be directed by policies and structured and organised by processes and supporting procedures. 5.35 Key performance indicator (KPI) Metric that is used to track the performance, effectiveness or efficiency of a service or process Note: KPIs are generally important metrics that will be aligned to critical success factors and important goals. KPIs are therefore a subset of all possible metrics, intended to allow for monitoring a service or process. 5.36 Known error Problem which has not (yet) been corrected, but for which there is a documented workaround or temporary fix to prevent (excessive) negative impact on services 5.37 Management review Periodic evaluation of the suitability, maturity and efficiency of the entire management system by its accountable owner(s), from which opportunities for improvement are identified and follow-up actions are determined Note: The accountable owner of a management system is usually a top management representative of the organisation operating the management system. In a federation, the accountable owner is usually one person nominated by top management representatives of all organisations (i.e. federation members) involved. 5.38 Management system Entirety of policies, processes, procedures and related resources and capabilities aiming at effectively performing management tasks in a given context and for a given subject Note 1: A management system is generally intangible. It is based on the idea of a systematic, structured and process-oriented way of managing. Note 2: While documentation (such as process definitions, procedures and records) and tools (such as workflow support and monitoring tools) can be parts of a management system, management system considerations are not limited to the questions of documentation and tool support. Note 3: With respect to (IT) service management and the FitSM standard series, the idea of a service management system (SMS) is a central concept, where the context of the management system is the organisational context of the service provider, and the subject is to plan, deliver, operate and control (IT) services. 5.39 Maturity level Achieved overall effectiveness of a service management system, based on the combination of the capability levels of its processes and general aspects of management Page 7 Version 2.4

5.40 Nonconformity Case or situation where a requirement is not fulfilled Note: This may also be referred to as noncompliance. 5.41 Operational level agreement (OLA) Documented agreement between a service provider and another part of the service provider s organisation or a federation member to provide a service component or subsidiary service needed to allow provision of services to customers 5.42 Operational target Reference / target value for a parameter used to measure the performance of a service component, listed in an operational level agreement (OLA) or underpinning agreement (UA) related to this service component Note: Typical operational targets might include availability or allowed resolution times for incidents. 5.43 Policy Documented set of intentions, expectations, goals, rules and requirements, often formally expressed by top management representatives in an organisation or federation Note: Policies are then realised in processes, which are in turn made up of activities that people carry out according to defined procedures. 5.44 Post implementation review (PIR) Review after the implementation of a change that determines if the change was successful Note: Depending on the specific type and complexity of the change, the post implementation review may vary widely in its depth. 5.45 Priority Relative importance of a target, object or activity Note: Often incidents, service requests, problems and changes are given a priority. In the case of incidents and problems, priority is usually based on the specific impact and urgency of the situation. 5.46 Problem Underlying cause of one or more incidents that requires further investigation to prevent incidents from recurring or reduce the negative impact on services 5.47 Procedure Specified set of steps or instructions to be carried out by an individual or group to perform one or more activities of a process 5.48 Process Structured set of activities, with clearly defined responsibilities, that bring about a specific objective or set of results from a set of defined inputs Page 8 Version 2.4

Note: Generally, a process consists of a number of activities used to manage services, if the process is part of a service management system (SMS). 5.49 Record Documentation of an event or of the results of performing a process or activity 5.50 Release Set of one or more changes to configuration items (CIs) that are grouped together and deployed as a logical unit 5.51 Request for change (RFC) Documented proposal for a change to be made to one or more configuration items (CIs) 5.52 Risk Possible negative occurrence that would have a negative impact on the service provider s ability to deliver agreed services to customers, or that would decrease the value generated through some service Note: Risk is made up of the probability of the threat entailed, the vulnerability to that threat of some asset, and the impact the threat would have, if it occurred. 5.53 Role Set of responsibilities and connected behaviours or actions collected into a logical unit that can be assigned to an individual or group Note: An individual may take over multiple roles. 5.54 Service Way to provide value to customers through bringing about results that they want to achieve Note: In the context of the FitSM standard series, when referring to services, usually IT services are meant. 5.55 Service acceptance criteria (SAC) Criteria that must be fulfilled by the time a new or changed service is deployed and made available to customers / users Note: SAC are defined when a new or changed service is designed, and they may be updated or refined during the development or transition phase. They may cover functional and non-functional aspects of the specific service to be deployed. SAC are part of the service design and transition package (SDTP). 5.56 Service catalogue Customer-facing list of all live services offered along with relevant information about these services Note: The service catalogue can be regarded as a filtered version of and customers view on the service portfolio. Page 9 Version 2.4

5.57 Service component Logical part of a service that provides a function enabling or enhancing a service Note 1: A service is usually composed of several service components. Note 2: A service component is usually built from one or more configuration items (CIs). Note 3: Although a service component underlies one or more services, it usually does not create value for a customer alone and is therefore not a service by itself. 5.58 Service design and transition package (SDTP) Entirety of plans for the design and transition of a specific new or changed service Note: An SDTP should be produced for every new or changed service. It may consist of a number of documented plans and other relevant information, available in different formats, including a list of requirements and service acceptance criteria (SAC), a project plan, communication and training plans, technical plans and specifications, resource plans, development and deployment schedules / timetables, etc. 5.59 Service level agreement (SLA) Documented agreement between a customer and service provider that specifies the service to be provided and the service targets that define how it will be provided 5.60 Service management Entirety of activities performed by a service provider to plan, deliver, operate and control services offered to customers Note 1: The activities carried out in the service management context should be directed by policies and structured and organised by processes and supporting procedures. Note 2: In the context of the FitSM standard series, when referring to service management, usually IT service management is meant. 5.61 Service management plan Overall plan for implementing and operating a service management system (SMS) 5.62 Service management system (SMS) Overall management system that controls and supports management of services within an organisation or federation Note: The SMS can be regarded as the entirety of interconnected policies, processes, procedures, roles, agreements, plans, related resources and other elements needed and used by a service provider to effectively manage the delivery of services to customers. 5.63 Service portfolio Internal list that details all the services offered by a service provider, including those in preparation, live and discontinued Page 10 Version 2.4

Note: For each service, the service portfolio may include information such as its value proposition, target customer base, service description, relevant technical specifications, cost and price, risks to the service provider, service level packages offered, etc. 5.64 Service provider Organisation or federation (or part of an organisation or federation) that manages and delivers a service or services to customers 5.65 Service report Report that details the performance of a service versus the service targets defined in service level agreements (SLAs) often based on key performance indicators (KPIs). 5.66 Service request User request for information, advice, access to a service or a pre-approved change Note: Service requests are often handled by the same process and tools as incidents. 5.67 Service review Periodic evaluation of the quality and performance of a service together with the customer or under consideration of customer feedback, from which opportunities for improvement are identified, follow-up actions to increase the value of the service are determined 5.68 Service target Reference / target values for a parameter used to measure the performance of a service, listed in a service level agreement (SLA) related to this service Note: Typical service targets might include availability or resolution time for incidents. 5.69 Supplier External organisation that provides a (supporting) service or service component(s) to the service provider, which they need to provide services to their customers / users 5.70 Top management Senior management within an organisation who has authority to set policies and exercise overall control of the organisation 5.71 Underpinning agreement (UA) Documented agreement between a service provider and an external supplier that specifies the underpinning service(s) or service component(s) to be provided by the supplier, together with the related service targets Note 1: A UA can be seen as a service level agreement (SLA) with an external supplier where the service provider is in the customer role. Note 2: A UA may also be referred to as an underpinning contract (UC). Page 11 Version 2.4

5.72 Underpinning contract (UC) See: Underpinning agreement (UA) 5.73 User Individual that primarily benefits from and uses a service 5.74 Value Benefit to a customer and their users delivered by a service Note: Value should be considered as a composition of the utility (fitness for purpose) and warranty (fitness for use, covering sufficient availability / continuity, capacity / performance and information security) connected to a service. 5.75 Workaround Means of circumventing or mitigating the symptoms of a known error that helps to resolve incidents caused by this known error, while the underlying root cause is not permanently eliminated Note 1: Workarounds are often applied in a situation, when the actual root cause of (recurring) incidents cannot be resolved due to lack of resources or ability. Note 2: A workaround may consist of a set of actions to be carried out by either the provider or the user of the service. Note 3: A workaround is also referred to as a temporary fix or temporary solution. Page 12 Version 2.4

6. Overview of the FitSM process model All parts of FitSM are based on an understanding of the following 14 core processes for IT service management (ITSM). Process Service portfolio management (SPM) Service level management (SLM) Service reporting management (SRM) Service availability and continuity management (SACM) Capacity management (CAPM) Information security management (ISM) Customer relationship management (CRM) Supplier relationship management (SUPPM) Incident and service request management (ISRM) Problem management (PM) Configuration management (CONFM) Objective To define and maintain a service portfolio To maintain a service catalogue, and to define, agree and monitor service levels with customers by establishing meaningful service level agreements (SLAs) and supportive operational level agreements (OLAs) and underpinning agreements (UAs) with suppliers To specify all service reports and ensure they are produced according to specifications in a timely manner to support decision-making To ensure sufficient service availability to meet agreed requirements and adequate service continuity To ensure sufficient capacities are provided to meet agreed service capacity and performance requirements To manage information security effectively through all activities performed to deliver and manage services, so that the confidentiality, integrity and accessibility of relevant information are preserved To establish and maintain a good relationship with customers receiving services To establish and maintain a healthy relationship with suppliers supporting the service provider in delivering services to customers, and monitor their performance To restore normal / agreed service operation within the agreed time after the occurrence of an incident, and to respond to user service requests To investigate the root causes of (recurring) incidents in order to avoid future recurrence of incidents by resolving the underlying cause, or to ensure workarounds / temporary fixes are available To provide and maintain a logical model of all configuration items (CIs) and their relationships and dependencies Page 13 Version 2.4

Change management (CHM) Release and deployment management (RDM) Continual service improvement management (CSI) To ensure changes to CIs are planned, approved, implemented and reviewed in a controlled manner to avoid adverse impact of changes to services or the customers receiving services To bundle changes of one or more CIs to releases, so that these changes can be tested and deployed to the live environment together To identify, prioritize, plan, implement and review improvements to services and service management For each of these processes, as well as for a number of general aspects in the context of ITSM, FitSM-1 defines a small number of implementation requirements, while FitSM-2 provides guidelines on the activities to set up and implement ITSM using these processes. FitSM-3 describes the proposed roles to be assigned to execute the ITSM processes as part of a service management system. The following figure shows a possible grouping of the FitSM processes, based on six main topic areas. Page 14 Version 2.4